Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    122s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    02/05/2024, 07:24

General

  • Target

    0ddef3c9e705f4704a420a2c3f114b9d_JaffaCakes118.html

  • Size

    9KB

  • MD5

    0ddef3c9e705f4704a420a2c3f114b9d

  • SHA1

    93ba1ace37f9901f8bf2f875251face4b4e6c755

  • SHA256

    3839ef298f75d20aa7b1b2add4904a96466938685417da4e74f7239ed2e0e4d7

  • SHA512

    449c2d4c7b3b2e20a89b7c3f176fa0d3a459d46e06330f09143999c01d772f65056ea12b23a0e270103f39691b1ad3b0bbf7a4888ab1f58b43ee401681e46574

  • SSDEEP

    192:PcvSCvztuoTiJtkH0kO/C/bKE3t1+EaO4l7tOl2DDJJ1Nvko2g:0vlvztgJtfkOext1baOk7tO6TvR

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\0ddef3c9e705f4704a420a2c3f114b9d_JaffaCakes118.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2020
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2020 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2940

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3f04a5c89c557b351e5d3d190b088a30

    SHA1

    73862c1053e94ebc21fe9bf8c059bcf86440d01c

    SHA256

    690f8e294369dd3949d4173725aa645729ddf3299583d9a7866cb8b7d62f624b

    SHA512

    cf5b4f82f2af211a38202d831fd13351bebe9ef1e01f679b747acc6228d115853518a901094bd2a5b17b69048a0a27c3cc38d00d97022c54d3d9a5e18e9ffc75

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    59eba29f60069fc65ef6a649346af007

    SHA1

    670e13928f789ad2b821af71c1abeb4ab911f00a

    SHA256

    12557e4750902522802087bacac5bb5f68fa2c4c0cc8b41266a9cb7dd76e0b62

    SHA512

    cccea1b74bce9c1b93348232a46fb9fce2a457c8e512525024c7d4a82700e1312514d2127983ab63ae31f6eb5dd2507c555db9680e8d9ae8aa70b40576ca316b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5a20d164923980e2253c91fccb7e33f9

    SHA1

    f89b9cc6b107519639dcbe5f562cfa10aaf1248d

    SHA256

    6a6e48abcff7b1863a9d685a5cad9b115c73360b39ad380078e71cc00bd98e8a

    SHA512

    dfca0b29cd98a392bff040a1be982c4fc56bb1244ad205e1ffada0bfd2379ea69c72a13ea61df12adb0b132b749f4292c11cc5f03cdcf98ecc7de5fa3fca8ec8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    148e687678003b795fc9fe7bc39b0274

    SHA1

    d5c4aea72c7bcfdcb96142fa0c3f621ecd002349

    SHA256

    3653ee850df73a66e79367acf79230141edd14b1b3418004d1ef0af368ee9448

    SHA512

    59e024b7dbf2b1f5daa6b86d98f649b88355b399d346d02176fcc949d7a712cec2b940b4f7de4af3de7e001135ae0afc6e18c91317d66ffff7bfe8b8744f520a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    745669b2bd7dde981c0a881e7bb3c9da

    SHA1

    1ca13030930c3bebe2ef3357a68a77734ce3ed78

    SHA256

    67e636a3eafe6af49f5f815e7d1679b40f4742da5ea6fefe2a99fdbcf800cce9

    SHA512

    4d2f1ec1c664474dfcfc41b03af264297747d9e2528f769fea5b294eb357f225aa7216310d02f5422a606788b0bbcee4e25411e9e109b17e16d37c868a3bb639

  • C:\Users\Admin\AppData\Local\Temp\Cab7CBF.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar7DC2.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a